Skip to main content

CVE-2026-3832

CVE Details

Visit the official vulnerability details page for CVE-2026-3832 to learn more.

Initial Publication

04/30/2026

Last Update

05/03/2026

Third Party Dependency

gnutls

NIST CVE Summary

A flaw was found in gnutls. A remote attacker could exploit this vulnerability by presenting a specially crafted Online Certificate Status Protocol (OCSP) response during a TLS handshake. Due to a logic error in how gnutls processes multi-record OCSP responses, a client with OCSP verification enabled may incorrectly accept a revoked server certificate, potentially leading to a compromise of trust.

CVE Severity

3.7

Our Official Summary

Investigation is ongoing to determine how this vulnerability affects our products.

Status

Undergoing Analysis

Affected Products & Versions

VersionPaletteAIPaletteAI VerteX
1.0.7⚠️ Impacted⚠️ Impacted

Revision History

No revisions available.